hoheinzollern / workshop-cybersikkehed
Workshop on binary exploitation for the Danish Cybersecurity Championships
☆21Updated last year
Alternatives and similar repositories for workshop-cybersikkehed:
Users that are interested in workshop-cybersikkehed are comparing it to the libraries listed below
- ☆8Updated last year
- ☆14Updated 2 years ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆695Updated 7 months ago
- Writeups of previous editions☆71Updated last year
- Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the…☆209Updated 3 years ago
- Learn Binary Exploitation with sample problems and solutions☆141Updated 2 years ago
- CONVEX is a group of CTFs that are independently deployable into participant Azure environments.☆139Updated 2 years ago
- ☆351Updated 3 years ago
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆635Updated 9 months ago
- Labs for Practical Malware Analysis & Triage☆957Updated 2 weeks ago
- A guide on how to become an Information (or Cyber) Security Professional. With resources from free to expensive.☆567Updated 2 years ago
- Resources for TCM Security Linux 101 course☆290Updated last year
- Great List of Resources to Build an Enterprise Grade Home Lab☆830Updated last year
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆753Updated 4 months ago
- A curated list of awesome infosec courses and training resources.☆202Updated last year
- Vulnerable server used for learning software exploitation☆1,035Updated 4 years ago
- Reverse Engineering Resources☆223Updated 6 years ago
- This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.☆558Updated last year
- Example reports from prior years of the Collegiate Penetration Testing Competition☆144Updated 11 months ago
- Run this one line of code to make your fresh Kali install a little more awesome☆18Updated 2 weeks ago
- A sorted and updated list of security wargame sites.☆986Updated 2 weeks ago
- A Highly Accessible and Automated Virtualization Platform for Security Education☆191Updated last month
- Instructions on how to create your very own Pwnbox, originally created by HTB☆402Updated 2 years ago
- ImaginaryCTF is a platform that brings the beauty of CTF Competitions to discord, releasing a challenge every day☆43Updated 9 months ago
- Fake msfconsole for the use in demonstrations☆20Updated 4 years ago
- KEA Diplom i IT-sikkerhed kurser☆12Updated last month
- This a collection of the code that I have written for the Poor Man's Pentest presentation.☆561Updated 3 years ago
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,719Updated 4 years ago
- This OSINT Notebook provides an overview of the tools, techniques, and resources that I use for a variety of situations when it comes to …☆345Updated 8 months ago
- ☆1,386Updated 4 years ago